Static task
static1
Behavioral task
behavioral1
Sample
d1f1f6548b68494d0289eaa47b298e37180317bf91de7a2e66578dd3872bc91c.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
d1f1f6548b68494d0289eaa47b298e37180317bf91de7a2e66578dd3872bc91c.exe
Resource
win10v2004-20221111-en
General
-
Target
d1f1f6548b68494d0289eaa47b298e37180317bf91de7a2e66578dd3872bc91c
-
Size
92KB
-
MD5
47656279bd4ac3222623df2aaa9c708f
-
SHA1
0b92b18b2942fa9cfb6647a8853f14f515026bc3
-
SHA256
d1f1f6548b68494d0289eaa47b298e37180317bf91de7a2e66578dd3872bc91c
-
SHA512
0ea18b928e44eac440008126b1eceffecf72febf00097e1ee287b8f29bd50fd3da0adba2f6d472b0ef7124d03eadf9ea99f7e18ac70927cef59442e6708342f6
-
SSDEEP
1536:RH2UmNjKg7B/kQrYvbNNoZ/vDWo4rJ//efLNHndlwngY7l:RWTlKkB/khDNGZ6lefR9l9S
Malware Config
Signatures
Files
-
d1f1f6548b68494d0289eaa47b298e37180317bf91de7a2e66578dd3872bc91c.exe windows x86
d4922db3e8e0202f7d873c3fdff8e4e1
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
SetFileAttributesA
CreateProcessA
GetEnvironmentVariableA
GetShortPathNameA
RemoveDirectoryA
MoveFileA
GetTimeFormatA
InterlockedExchange
GetVolumeInformationW
SetLastError
ExitProcess
GetCurrentProcessId
GetFileTime
GetModuleFileNameW
FindCloseChangeNotification
FindFirstChangeNotificationW
GetSystemDirectoryW
CreateEventA
GlobalMemoryStatus
LeaveCriticalSection
FileTimeToSystemTime
DeviceIoControl
WaitForSingleObject
GetCurrentProcess
GetTempPathW
LoadLibraryW
RemoveDirectoryW
MoveFileW
FindNextFileW
FindFirstFileW
TlsSetValue
TlsAlloc
GetModuleHandleA
GetCurrentThreadId
GetCommandLineW
GetProfileStringW
VirtualProtect
GetLocaleInfoA
GetStringTypeW
GetStringTypeA
LCMapStringW
MultiByteToWideChar
LCMapStringA
GetSystemTimeAsFileTime
GetTickCount
QueryPerformanceCounter
HeapSize
VirtualQuery
RtlUnwind
IsBadWritePtr
HeapReAlloc
VirtualAlloc
HeapAlloc
GetCPInfo
GetOEMCP
GetSystemInfo
GetACP
LoadLibraryA
HeapFree
VirtualFree
HeapCreate
HeapDestroy
GetFileType
SetHandleCount
GetEnvironmentStringsW
GetLastError
WideCharToMultiByte
FreeEnvironmentStringsW
GetStartupInfoA
GetCommandLineA
GetVersionExA
GetProcAddress
TerminateProcess
WriteFile
GetStdHandle
GetModuleFileNameA
UnhandledExceptionFilter
FreeEnvironmentStringsA
GetEnvironmentStrings
user32
LoadIconA
SetMenuItemInfoA
GetSysColor
LockWindowUpdate
CreateWindowExW
EnableWindow
IsWindow
SetScrollInfo
DialogBoxIndirectParamA
MessageBoxA
GetMessagePos
FindWindowA
GetKeyNameTextA
GetWindowTextLengthW
EnumChildWindows
SetWindowPos
GetWindowTextW
SetClipboardData
SendDlgItemMessageA
CloseClipboard
EndDialog
OffsetRect
CheckRadioButton
GetClipboardData
SetForegroundWindow
IntersectRect
InsertMenuItemW
SetCursor
GetDoubleClickTime
InflateRect
UpdateWindow
Sections
.text Size: 42KB - Virtual size: 42KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 11KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 22KB - Virtual size: 22KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: 53B - Virtual size: 53B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 952B - Virtual size: 952B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ